Results 11 to 20 of about 2,794 (176)

Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts [PDF]

open access: green, 2017
We provide a tight security proof for an IND-CCA Ring-LWE based Key Encapsulation Mechanism that is derived from a generic construction of Dent (IMA Cryptography and Coding, 2003). Such a tight reduction is not known for the generic construction.
M. Albrecht   +4 more
openalex   +5 more sources

Design of Linkable Ring Signature Scheme Based on the MP-LWE Problem and Its Application in IoV

open access: goldIET Information Security
Ensuring the information security and privacy of users in the Internet of Vehicles (IoV) is crucial for gaining user trust and promoting the application of vehicular networks.
Lansheng Han, Wei Liao, Peng Chen
doaj   +2 more sources

Characterizing Disease Severity Through Surgical Recurrence Rates in Idiopathic Subglottic Stenosis. [PDF]

open access: yesLaryngoscope
The following investigation examined endoscopic surgical interval rates across a patient with idiopathic subglottic stenosis (iSGS) first 2 years of treatment compared to their last 3 years of treatment over a total of 5 years of follow up. Through comparison of these two intervals a disease severity classification for iSGS based on decreasing ...
Bowen AJ   +15 more
europepmc   +2 more sources

Nonlinear optical properties of photosensory core modules of monomeric and dimeric bacterial phytochromes. [PDF]

open access: yesProtein Sci
Abstract Near‐infrared (NIR) fluorescent proteins and optogenetic tools derived from bacterial phytochromes' photosensory core modules (PCMs) operate within the first (NIR‐I) tissue transparency window under single‐photon activation. Leveraging two‐photon (2P) light in the second transparency window (NIR‐II) for photoswitching bacterial phytochromes ...
Galiakhmetova D   +11 more
europepmc   +2 more sources

An MLWE-Based Cut-and-Choose Oblivious Transfer Protocol [PDF]

open access: yesEntropy
The existing lattice-based cut-and-choose oblivious transfer protocol is constructed based on the learning-with-errors (LWE) problem, which generally has the problem of inefficiency.
Yongli Tang   +5 more
doaj   +2 more sources

A novel framework for secure cryptocurrency transactions using quantum crypto guard [PDF]

open access: yesPeerJ Computer Science
In today’s digital world, cryptocurrencies like Bitcoin can secure transactions without banks. However, the rise of quantum computing poses significant threats to their security, as traditional cryptographic methods may be easily compromised. In addition,
Jamil Abedalrahim Jamil Alsayaydeh   +4 more
doaj   +3 more sources

Practical CCA2-Secure and Masked Ring-LWE Implementation

open access: greenTransactions on Cryptographic Hardware and Embedded Systems, 2018
During the last years public-key encryption schemes based on the hardness of ring-LWE have gained significant popularity. For real-world security applications assuming strong adversary models, a number of practical issues still need to be addressed.
Tobias Oder   +3 more
doaj   +3 more sources

Quantum-resilient and adaptive multi-region data aggregation for IoMT using zero-knowledge proofs and edge intelligence [PDF]

open access: yesScientific Reports
The Internet of Medical Things (IoMT) transforms healthcare by enabling real-time monitoring of patient vitals, such as heart rate and glucose levels, but faces significant challenges in securing sensitive data against cyber threats and ensuring ...
Soufiane Ben Othman, Gyanendra Kumar
doaj   +2 more sources

A Post-Quantum Public-Key Signcryption Scheme over Scalar Integers Based on a Modified LWE Structure [PDF]

open access: yesSensors
To ensure confidentiality and integrity in the era of quantum computing, most post-quantum cryptographic schemes are designed to achieve either encryption or digital signature functionalities separately.
Mostefa Kara   +3 more
doaj   +2 more sources

A Blockchain Copyright Protection Scheme Based on CP-ABE Scheme with Policy Update [PDF]

open access: yesSensors
Although the copyright protection schemes supported by blockchain have significantly changed traditional copyright data management, there are still some data security challenges that cannot be ignored, especially the secure access and controllable ...
Jian Jiang   +3 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy